A Secure Framework to Authenticate Remotely Digital Documents based on The TLS Protocol

被引:0
|
作者
Lopez Pimentel, Juan C. [1 ]
Ibarra Orozco, Rodolfo E. [1 ]
Fon Bon, Victor F. Ramos [1 ]
Monroy, Rail [2 ]
机构
[1] Univ Politecn Chiapas, Dept Software Dev Engn, Calle Eduardo J Selvas S-N & Ave Manuel de J, Tuxtla Gutierrez, Chiapas, Mexico
[2] Campus state Mexico, Dept Comp Sci, Monterrey Technol, Atizapan 52926, Mexico
关键词
Security-protocols; steganography; cryptography; watermarking and e-commerce;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Every day digital resources protection is an appealing research area because the amount of e-documents transmitted over non-secure channels such as the Internet has increased considerably. So, secure mechanisms must be implemented to identify illegal copies of crucial information. Many researchers have proposed solutions based on controlled environments applying asymmetric cryptography. Other researchers have applied some techniques such as steganography, cryptography and security protocols to deal with uncontrolled environment. This paper presents a secure framework to sign and authenticate remotely digital documents focused on uncontrolled environment. The framework is compound by various security protocols used to ensure authentication and confidentiality in each of the services. Each of protocols has been formally verified using The AVISPA tool and we found that they provide strong authentication and privacy security properties. In addition, the framework has also been adapted to work with TLS and SSL protocols because they are the standard in e-commerce.
引用
收藏
页码:1264 / +
页数:2
相关论文
共 50 条
  • [1] TLS PROTOCOL: SECURE PROTOCOL WITH CLIENT PUZZLES
    Raluca, Catargiu
    Monica, Borda
    [J]. 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 149 - 152
  • [2] USING KERBEROS TO SECURE TLS PROTOCOL
    Raluca, Catargiu
    Monica, Borda
    [J]. 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 237 - 240
  • [3] Digital signature enablement for TLS protocol
    Si, Tiange
    Tan, Xiangrong
    Dai, Yiqi
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2004, 44 (01): : 58 - 60
  • [4] Secure and Efficient Protocol for Transmission of Multi Digital Documents Using Blind Signcryption
    Fazlullah
    Ul Amin, Noor
    Iqbal, Jawaid
    Umar, Arif Iqbal
    Shahid, Muhammad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (06): : 68 - 78
  • [5] Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS
    Zhao, Shijun
    Zhang, Qianying
    Qin, Yu
    Feng, Dengguo
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 110 - 123
  • [6] A Secure Framework for Authentication of Documents in Cloud
    Ganta, Srikanth
    Pradhan, Jayaram
    Challa, Narasimham
    [J]. HELIX, 2018, 8 (03): : 3406 - 3412
  • [7] Integration of the digital signature in the protocol SSL/TLS
    Serhrouchni, Ahmed
    Hajjeh, Ibrahim
    [J]. ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2006, 61 (5-6): : 522 - 541
  • [8] Enabling VPN and secure remote access using TLS protocol
    Badra, Mohamad
    Hajjeh, Ibrahim
    [J]. WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 308 - +
  • [9] Secure Digital Steganography for ASCII Text Documents
    Rafat, Khan Farhan
    Sher, M.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08) : 2079 - 2094
  • [10] Secure Digital Steganography for ASCII Text Documents
    Khan Farhan Rafat
    M. Sher
    [J]. Arabian Journal for Science and Engineering, 2013, 38 : 2079 - 2094